Bandwidth reservation in mobile adhoc networks



Similar documents
Towards a New Approach in Available Bandwidth Measures on Mobile Ad Hoc Networks

Dynamic Bandwidth Management in IEEE Based Multihop Wireless Networks

CSMA/CA. Information Networks p. 1

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

... neither PCF nor CA used in practice

A TCP-like Adaptive Contention Window Scheme for WLAN

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Voice Service Support over Cognitive Radio Networks

Novel Client Booking System in KLCC Twin Tower Bridge

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Adaptive DCF of MAC for VoIP services using IEEE networks

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Efficient Load Balancing Routing in Wireless Mesh Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Performance Analysis of the IEEE Wireless LAN Standard 1

Mobility management and vertical handover decision making in heterogeneous wireless networks

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Bandwidth Measurement in Wireless Networks

Real-Time Traffic Support in Heterogeneous Mobile Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Enhancement of VoIP over IEEE WLANs by Adapting Transmitting Interval

Natarajan Meghanathan Assistant Professor of Computer Science Jackson State University Jackson, MS 39217, USA

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks

ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Energy Consumption analysis under Random Mobility Model

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

A Link-state QoS Routing Protocol for Ad Hoc Networks

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

Performance Analysis of MANET with Low Bandwidth Estimation

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Quality of Service for MANETs connected to the Internet

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Routing with Load Balancing in Wireless Ad hoc Networks

other. A B AP wired network

Algorithms for Interference Sensing in Optical CDMA Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A QOS ROUTING PROTOCOL BASED ON AVAILABLE BANDWIDTH ESTIMATION FOR WIRELESS AD HOC NETWORKS

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Energy Efficiency of Load Balancing in MANET Routing Protocols

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

IEEE Ad Hoc Networks: Performance Measurements

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

A Novel Technique to Isolate and Detect Jamming Attack in MANET

Introduction to the papers of TWG18: Mathematics teacher education and professional development.

DAG based In-Network Aggregation for Sensor Network Monitoring

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

QASM: a Q&A Social Media System Based on Social Semantics

Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Admission Control for VoIP Traffic in IEEE Networks

MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Reliable Adaptive Lightweight Multicast Protocol

A Survey: High Speed TCP Variants in Wireless Networks

Performance Evaluation of the IEEE p WAVE Communication Standard

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Transcription:

Bandwidth reservation in mobile adhoc networks Redouane Belbachir, Zoulikha Mekkakia, Ali Kies, Bernard Cousin To cite this version: Redouane Belbachir, Zoulikha Mekkakia, Ali Kies, Bernard Cousin. Bandwidth reservation in mobile adhoc networks. IEEE Wireless Communications and Networking Conference (WCNC 2012), Apr 2012, Paris, France. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2012), pp.2608-2613, 2012, <10.1109/WCNC.2012.6214240>. <hal- 01183600> HAL Id: hal-01183600 https://hal.archives-ouvertes.fr/hal-01183600 Submitted on 10 Aug 2015 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Bandwidth Reservation in Mobile Adhoc Networks Redouane Belbachir, Mekkakia Maaza Zoulikha, Ali Kies, Bernard Cousin belbachir red@yahoo.fr, zoulikh@gmail.com, kies ali@yahoo.fr, bcousin@irisa.fr Department of Mathematics and Computer Science, IRISA University of Oran Mohamed Boudiaf-USTO, Algeria. University of Rennes 1, France. Abstract The bandwidth reservation is one of most adopted solutions to meet QoS requirements in 802.11 ad hoc networks. The efficiency of these solutions depends on the accuracy of their estimations of available bandwidth; otherwise, their application can be catastrophic on networks. Therefore, accurate bandwidth estimation is fundamental, where each networks characteristic must be taken into consideration, including mobility and medium sharing. Current solutions do not take into account all networks characteristics, resulting to wrong bandwidth estimations and QoS violations. In this paper, we present a new approach for bandwidth reservation -Accurate Bandwidth Reservation (ABR)- which embeds an improved method of available bandwidth measurement, where all criteria of such networks are considered. Evaluation of ABR is performed by simulations and comparisons with some existing approachs. Index Terms Ad hoc networks, Accuracy, Mobility, Bandwidth Estimation, ABR. I. INTRODUCTION IEEE 802.11-based ad hoc networks are able to provide some QoS level through an service differentiation, due to the IEEE 802.11e amendment. However, no solution has been standardized for reservation of critical ressources like bandwidth. The reservation of communication resources like bandwidth becomes necessary for QoS flows guarantees, in order that flows are delivered without that there bandwidth is degraded, and so avoid delaying delivering or data losses.thus, the reservation must be accurate enough to assure the admissions of right flows. Several solutions for bandwidth reservation have been proposed, which results to failures reservations because of their inaccurate available bandwidth (AB) estimation methods. The performance of BR solutions is evaluated by two metrics false admission rate and false reject rate. False admission means that flows whose bandwidth consumption is beyond the capacity of the network are admitted. The cause of false admission, is the overestimation of AB. False reject means that flows whose bandwidth consumption is not beyond the capacity of the network are rejected, caused by the AB underestimations. In this paper, we present a novel bandwith reservation approach, named ABR (Accurate Bandwidth Reservation), which provides accurate admission control for bandwidth reservation in mobile ad hoc networks, by improving the available bandwidth estimations. We noticed that the estimation errors are due to two items. The first one is the neglect of some network criteria, and the second is a bad computing and/or integration of the considered network criteria in estimations. ABR increases the accuracy of available bandwidth estimation by considering each wireless 802.11 ad hoc network criteria as the overlap of the channel idle periods, collisions and mobility. II. RELATED WORK AB between two neighbor nodes, is defined as the maximum throughput that can be transmitted between these two nodes without degrading the throughputs of existing flows in the network. In order to evaluate AB in wireless ad hoc networks, some authors [1] adopt methods which are intended firstly for wired networks [2], where measurements are based on the injection of probe packets. These methods were inefficient in wireless IEEE 802.11 networks since the large inaccuracy because of channel access proprieties. Therefore, there is a reorientation towards a measurement methods based on the passive monitoring of the networks activities. The authors of QoS-aware [3] routing protocol, estimate AB per node, by updating periodically the rate value of the channel availability time sensed at MAC layer. So the available bandwidth AB i on node i is defined as: AB i = t i C = I i C (1) Where t i is the channel availability time, sensed at node i during the period, C is the channel capacity and I i =(t i /) is the channel availability rate. Since the contention for medium access due to its sharing between nodes, the bandwidth is also shared. So, identify the medium availability at node must be joined by the medium availability at its neighbors. In QoS-AODV [4], the authors use the exchange of hello packets to exchange the computed AB per node in neighborhood. Then, AB at one node is considered as the minimum AB of its neighborhood. Some papers consider the bandwidth sharing on carrier sense range, such as BRuIT [5], CACP [6] and IAB [7]. In BRuiT, each node provides information about its AB, and about its neighbors. So the admission control is based on two-hop neighborhood knowledge, In CACP, the node s transmission power is increased during the hello packet exchange, so AB per node information reaches nodes on carrier sensing range. And in IAB, an probabilistic method is used. All the proposed methods of bandwidth estimation share the same principle with AAC [8] for AB definition on one link, as : (AB s,r is the AB on link (s, r)) AB s,r = min{ab s, AB r } (2)

Fig. 1. Scenario illustrating the problem of idle time overlaps III. ABR APPROACH The aim of the BR solutions is to ensure the data flow delivery without bandwidth degradation, while maintaining the throughputs of the ongoing flows in network. Given the features of the 802.11-based mobile ad hoc networks, the accurate AB estimation is a critical challenge that is addressed in this section. A. The overlap of the channel idle periods For brevity, N i and and (i,j) are the abbreviation of Node i and wireless link between node N i and N j respectively. Consider the topology of 6 nodes disposed as depicted in Fig. 1. The distance d is the communication radius, CS i is the sensing radius of N i. Therefore, N 4 (respectively N 3 ) senses the communication between N 5 and N 6 (respectively between N 1 and N 2 ). Flows f 1 and f 2 which are established on links (1, 2) and (5, 6) respectively, have same and constant bandwidth consuming about 50% of medium capacity. We intend to evaluate the AB on link (3, 4) according the bandwidth consumed by flows f 1 and f 2. Let s the two scenarios cases : 1) Sources N 2 and N 5 start exactly at the same time to transmit their flows. The two transmissions are completely synchronous. 2) N 2 sends each data packet exactly after that N 5 receives the acknowledgment of its data packet (MAC layer ACK). The two transmissions are completely asynchronous. In both scenarios, the values of medium s idle time at nodes N 3 and N 4 are similar about 50%. The difference between both scenarios, is the shift between idle times. In first scenario, the periods of medium availability of both nodes overlap, offering several communication opportunities, which explains the real AB of link (3, 4) is about 50%, with decreasing sometimes to 40% (because of the medium collisions). This scenario confirms the accuracy of estimation methods based on formula (2), particularly methods that consider collisions like IAB solution. In second scenario, the AB on link (3, 4) is practically null. The periods of medium availability of both nodes never overlap. When the medium is available at N 3, it is not available at N 4. So communication opportunities never exist during this scenario, although the medium is idle at 50% of time at N 3 and also at N 4. So, the link s AB depends on the overlap between the medium idle periods at transmitter and receiver. Evaluating the impact of this overlap requires an fine mechanism of clock synchronization and huge overhead due to aditional Fig. 2. Collision probabilities informations exchange. Therefore, we use the probabilistic average time to estimate the effect of this phenomenon. Since communications on links (5,6) and (2,1) are totaly independent, the channel idle periods on N 3 and N 4 are also independent. So, the average of communication opportunities is the average times where the channel idle periods on nodes overlap. Let s S s,r the average of communication opportunities between N s and N r. We notice : S s,r = S s S r, where S i is the set of channel s idle periods at N i. By considering that distribution of the channel s idle periods at N s and N r are totally independent, the average time of communication oppotunities is : (I r I s ). And the AB on wireless link (s,r) is defined as: AB s,r = (I r I s ) C (3) ABE-AODV [9] uses this same definition, but, it is an conservative solution because of the method by which it calculates and integrates the collisions phenomena in its bandwidth estimations. B. Collisions on 802.11-based Ad Hoc Networks Considering the overlap between the channel s idle periods at sender and receiver is not sufficient to decide about the link ability to convey a flow. Indeed, the collisions problems must be considered accurately, otherwise it conducts to erroneous estimates. ABE-AODV method computes AB on link (s,r) as ABE AODV (s,r) = (1 K) AB s,r (1 P ). Where K is the rate consumed due to the backoff time when collisions happen. P is the collision probability. ABE-AODV underestimates the AB issue, because of the excessive presence of collision rate in the computing formula (which already has the backoff (K), and the collision probabilities (P )), and because of the method used to compute the collision probability. When hello packets are issued regularly, in some methods, the receiver estimates the amount of these packets that it should receive in a given time interval. Comparing this figure with the actual number of hello packets received gives an estimate of the probability of collision between two peers. This confuses the effects of congestion-related losses due to collisions. When a node does not succeed in emitting as many hello packets as it should (due to an overloaded medium). Its neighbors considers that there are collisions

Fig. 3. Markov Chain model for the backoff window size. while there is not. ABE-AODV uses this collision probability P hello, and defines the probability of data packet collision (of 1000 bytes, data s size) as: P = P hello 2.19. We conduct a simulation on random topology of 30 nodes on area (900 m 500 m). 2 CBR flows, each flow is from one different source to one different destination are established. Fig. 2. represents the real collision probabilities of data packets compared to the estimated P Hello values and the total collision probability estimated by ABE-AODV. Note that following P Hello values, the collisions probabilities are overestimated, but the calculation and integration methods used by ABE- AODV, lead to an even worse estimations. Therefore, this means also a large underestimations of AB. In ABR approach, the conditional probability [10] is used. P i is the conditional collision [ probability on N i which has n neighbor nodes. P i = τ i 1 ] n j=0 (1 τ j). Where τ j is the transmission rate by N j. During the transmission from sender N s to N r, the packets may have collisions at N s or N r. If there was, in both cases the exponential backoff mechanism is triggered only at N s. Knowing that during the backoff time a node cannot transmit even the medium is idle [13]. So, there is an proportion of idle time which could be lost. If we consider an average backoff time at N s is backoff s, the AB on N s becomes: AB s = ( t s backoff s ) C (4) Note, that during the backoff time, a node can receive packets (the backoff is said to be frozen and it resumes after reception). So, the backoff mechanism activation has no effects on the receiver node. Therefore, the AB on the link (s,r) can be estimated more precisely as: AB s,r = I r ( t s backoff s ) C (5) Initially, the backoff mechanism uniformly selects an value in the interval [0, CW 0 1], 1 where CW 0 is the minimal 1 [0, CW 0 1] is the first contention range, each value represent a slot time s number, it is defined by MAC protocol specifications. contention window. The backoff timer decrements the value selected. When the timer reaches 0 it transmits the packet. This decrementation s procedure is represented by the stochastic process b(t) where t represents the contention range values. When collisions happen, the exponential backoff mechanism is triggered. After each unsuccessful transmission, the contention window size is doubled up to a maximum value denoted by CW max = 2 max CW 0, or until successful tranmission. Thus in the Markow model, there is transition from one contention range to another, where max represents the last stage. And let consider s(t) the stochastic process representing the backoff stage at slot time t. The bidimensional backoff process {s(t), b(t)} is modeled with the discrete-time Markov chain depicted in Fig. 3. An markov model that is similar to Bianchis markovian model [12]. The difference between the two models is onto the last stage of the backoff. Following Bianchis model, the backoff will be absolutly not initialized, as long as an packet is not successfully transmitted. Other side, the depicted model in Fig. 3 considers that when last backoffs stage is achieved then there will be return to the first stage (by taking another packet or the same). In this new Markov chain, the only non null transition probabilities are: P {i, k i, k + 1} = 1 k (0, CW i 2) i (0, max) P {i + 1, k i, 0} = p CW i+1 k (0, CW i+1 1) i (0, max 1) P {0, k i, 0} = 1 p CW 0 k (0, CW 0 1) i (0, max 1) P {0, k max, 0} = 1 CW 0 k (0, CW 0 1) Where : P {i 1, k 1 i 0, k 0} = P {s(t + 1) = i 1, b(t + 1) = k 1 s(t) = i 0, b(t) = k 0} Let consider the stationary distribution of the chain : b i,k = lim t P {s(t) = i, b(t) = k} Owing to the chain regularities: max 1 b i,k = CW i k b max,0 + (1 p) b j,0 i = 0 CW i j=0 p b i,0 0 < i max b i,0 = p b i 1,0 = p p b i 2,0 = = p i b 0,0 b i,0 = p i b 0,0 (6) Knowing that the probabilities sum is 1, then :

max CW i 1 b i,k = 1 i=0 1 = b 0,0 [ CW0 1 [ b 0,0 = 2 CW 0 + 1 + p max CW 0 k + CW 0 i=1 ( 1 p max 1 p p i CW i 1 ] CW i k CW i + 2CW 0 1 (2p)max 1 (2p) )] 1 The average backoff time P bt on one node to transmit one packet with collision probabilty p, is defined as: m CW i 1 P bt = k b i,k Then : i=0 P bt = b0,0 6 [CW 20 1 + p ( 4CW 2 0 (1 (4p)max ) 1 4p )] 1 pmax 1 p (7) So, on the measurement interval time for node s : The average backoff time backoff s on the measurement interval time at N s, is : backoff s = [ ( P bt Slot) + DIF S ] τs C P size Where Slot is the slot time size [13] considered in this paper as 20 µs, DIF S [13] is fixed to 50 µs, and P size is the data packet size. C. Mobility Management in Measures Increasing the exchange rate of hello packets is the solution mostly used in order to reduce the mobility impact. Let s the wireless link (s,r), with medium s capacity of 2 Mb/s. The mobility leads to an instability of distance between N s and N r. Suppose there is no traffic on the network and the distance between the two nodes is larger than communication radius, until time λ 1, each node becomes in the communication radius of the other. Fig. 4. shows the link s state during two consecutive measurement periods 1 and 2. In first period, the link exists only during X=10% of 1 period. At T, all bandwidth measures give the same wrong value of AB s,r, about 100% of availability. By considering that ( 1 = 2 = 1 second), means that up to 1.6 Mb of traffic 2 could be transmitted during [λ 1, T ] period, means 0.1 second. To avoid this wrong, the proportion indicated by X in Fig. 4. must be considered in measures. The consideration is crucial particularly when the admission control is executed at T and the proportion X is in the measurement period that follows, as shown in Fig. 4. by the interval [T, λ 2 ]. Therefore, the equation (7) became : AB s,r = I r (t s backoff s ) C λ2 T (9) In order to compute λ 2 value at T or before, we use an mobility prediction method, similar to that presented in [12]. Considering that each node s (respectively r) moves at velocity V s (respectively V r ), with direction α (respectively β). t j value is calculated as (for example at node s): 2 2 Mb/s of medium capacity and 1000 bytes of data packets size, result to 1.6 Mb/s application layer throughput. (8) Fig. 4. Link status during a () measurement period. if (V s = V r and α = β) λ 2 = (10) (ef+gh)+ (e 2 +g 2 ) d 2 (eh gf) 2 (e 2 +g 2 ) else Knowing that (x s, x r ) and (y s, y r ) are the coordinates of nodes s and r resepectively. And by considering : e =V s cos(α) - V r cos(β) f = x s x r g =V s sin(α) - V r sin(β) h = y s y r The coordinates are given through GPS system. During the exchange of hello packets, each node indicates the starting coordinates of its motion and the coordinates of its destination, as well the speed of its motion. Through these, the receiving nodes of the hello packets, compute the motion direction of the hello packet s source node. D. Protocol Design Each node monitors the idle medium rate, its own transmission rate, and caculates the proportion rate which can be consumed by the backoff. When the source has a data flow, it checks firstly the availability of residual bandwidth through equation (1). If the check is positive, it broadcasts an route request packet (RREQ). The source indicates into the RREQ, the bandwidth required for its flow. When node receives the RREQ packet, it performs the admission control by comparing the bandwidth required by source and the estimated available bandwidth on the link constituted with its predecesor node, by using equation (9). If this check is negative discards the RREQ. In ABR, an node monitors the distances evolution by using the neighborhood s table. The prediction of link failure caused by the mobility, reduces the bandwidth availability following equation (9). If the prediction was after the flow admission, and the predicted time is reached or approached, the node sends a route error packet (RERR) to the source in order to stop its transmissions and avoid losses. IV. EVALUATION We perform an evaluation through simulations by using (NS2). An comparative study is presented in this section, between the simulations s results when ABR, AODV, ABE- AODV and IAB solutions are enabled. The medium access

scheme used is CSMA, the medium capacity is set to 2 Mb/s, and 1000 bytes of data packet s size. The below graphs are the average results of several simulations, where different parameters are considered as trafic load, transmition times, networks densities and mobilities. A. Accurate estimation in dense networks (a) AODV (b) IAB To illustrate the accuracy s estimations of ABR, firstly, an simulation is performed in a 900m 500m static network with 60 nodes. The nodes are randomly positioned. Five connections of CBR sources are attempted to be established in the network. Fig. 5(a) represents the throughput evolution of the five flows when no admission control is performed. The network becomes congested by the beging transmission of flow3. As shown, the appearence of flow5 results in dramatical increasing of flow3 s throughput. Fig. 5(b) represents the evolution of the different flows throughputs when IAB is enabled. IAB tends to overestimate the available bandwidth. Thus, admission control mechanism is not enough accurate when flow3 is accepted, arising an admission in degraded and disrupted state of its throughput. This disruption affects in turn at 45t h second the flows (flow2 and flow4), by degrading dramatically the throughputs of these last. When ABR approach is enabled, all flows are admitted except the second one (flow2). Thus, flow s throughputs are stable as it appeares on Fig. 5(c), all four remaining flows are able to fit into the network, indicating that, for other scenarios, the fourth flow was the only cause of wireless links overload. However, ABE-AODV tends to underestimate the available bandwidth. On Fig. 5(d), we notice that ABE-AODV accepts only the two first flows among the five. Therefore, admission control mechanism is very severe, resulting in under exploitation of bandwidth in network. In this scenario, underestimations are due to the collision probability s calculation method and its integration manner in bandwidth measurements by ABE-AODV. B. Mobility management during reservations (c) ABE-AODV (d) ABR Fig. 5. Throughputs of flows obtained by (a)aodv, (b)iab, (c)abe-aodv, and (d)abr To investigate the mobility effect on the solutions of bandwidth reservations, another simulation is performed on mobile environment. Below, an comparatif description is presented of results achieved by ABR, ABE-AODV and AODV. The simulation modelises 30 mobile nodes randomly positionned. The random way point mobility s model is chosen for the motion of nodes, with speed of 20m/s at maximum. Five CBR flows are generated, throughput s loads are randomly drawn between 300 kb/s and 600 kb/s. As shown on Fig. 6(a), where no admission control is applied. Once the flow4s transmission has started, the network ends up dramatically congestioned. An high irregularities appear on flows throughputs. The medium is overloaded and all flows suffer. This confirms that medium is not able to sustain all five flows. In opposite, when ABR s approach is enabled all flows throughputs are stable as shown on Fig. 6(b). This means

V. C ONCLUSION (a) AODV In this paper, we have presented a new approach ABR for bandwidth reservation on mobile ad hoc networks. ABR is an improvement of some existing approaches of available bandwidth estimation on wireless links. The main contribution of this research is the right combination during the integration of the phenomena of collision, mobility and the asynchrony of idle s medium periods in the measures available bandwidth. The ABR s performance is shown through simulation results, and comparative analysis with some existing approaches. The comparison has been particularly with ABE-AODV s approach which is the only with ABR, that consider the asynchrony of idle s medium period. ABR outperforms these approches in the stability of throughputs of flows and bandwidth resource quantities using. Therefore, an more bandwidth exploitation while respecting the required and admitted QoS. R EFERENCES (b) ABE-AODV (c) ABR Fig. 6. Throughputs obtained by (a)aodv, (b)abe-aodv, and (c)abr in mobile networks. that all admitted flows are able to fit into the network. Abr admits all flows when there paths are available and also the bandwidths are sufficient. In except, flow3 is rejected because its path was on breaking. Fig. 6(b) shows that ABE-AODV fails to perform an accurate admission control. Since, the mobility neglect in bandwidth measures, ABE-AODV allows the admission of flow3 on broken path. ABE-AODV is also too severe with flows, where only the flows 1,2 and 5 are admitted. This little consumption is due to the underestimations the available bandwidth. [1] A. Johnsson, B. Melander, and M. Bjorkman, Bandwidth Measurement in Wireless Network. In Proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Porquerolles, France, June, 2005. [2] B. Melander, M. Bjorkman, and P. Gunningberg, A New End-to-End Probing Analysis Method for Estimating Bandwidth Bottlenecks. In Proceedings of the Fifth Global Internet Symp. (Global Internet) held in conjunction with Global Comm. Conf. (GLOBECOM 00), Nov. 2000. [3] L. Chen, and W. Heinzelman, QoS-aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks. IEEE Journal on Selected Areas of Communication, 3, 2005. [4] R. Renesse, M. Ghassemian, V. Friderikos, and A. H. Aghvami, QoS Routing over Ad hoc On-demand Distance Vector Routing Protocol. Proceedings of IEE 3G Wireless 2004 Conference, London, UK, October 2004. [5] C. Chaudet, and I. G. Lassous, BRuIT - Bandwidth Reservation under InTerferences influence. Proceedings of European Wireless 2002 (EW2002), Florence, Italy, Feb. 2002. [6] Y. Yang and R. Kravets, Contention Aware Admission Control for Ad Hoc Networks. IEEE Trans. Mobile Computing, vol. 4, pp. 363 377, 2005. [7] H. Zhao, E. Garcia-Palacios, J. Wei, and Y. Xi, Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks. Computer Communications, Issue 32, pp. 10501057, 2009. [8] R. de Renesse, M. Ghassemian, and V. Friderikos, and A.H. Aghvami, Cross-layer cooperation for accurate admission control decisions in mobile ad hoc networks. IET Communications 1, pp. 577586, 2007. [9] C. Sarr, C. Chaudet, G. Chelius and I. G. Lassous, Bandwidth Estimation for IEEE 802.11-based Ad Hoc Networks. IEEE Transactions on Mobile Computing, Vol. 7, Num. 10, 2008. [10] A. Nafaa, Provisioning of multimedia services in 802.11-based networks: facts and challenges. IEEE Wireless Communications 14 (5), pp. 106112, 2007. [11] R. Belbachir, Z. M. Mekkakia, and A. Kies, Available Bandwidth Estimation with Mobility Management in Ad hoc Networks. Proceedings of The Third International Conference on Wireless, Mobile Network & Applications (WiMoA/ICCSEA 2011), Dubai, 2011. Springer, CCIS series, Vol. 154, pp. 304 315, 2011. [12] S. Lee, W. Su, and M. Gerla. Ad hoc wireless multicast with mobility prediction. Computer Communications and Networks, 4-9, 1999. [13] IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, 1997.